We're committed to protecting your personal and financial information, and as your partner, we want to let you know how you can help. Of course, if your information ever does fall into the wrong hands, we'll be here to make it right.
Your security is a top priority
Here you'll find tips to help with various situations, along with our contact information. Whether your card's missing or something's suspicious with your account, contact us and we'll help you right away.
Credit Card Fraud
Has your card been lost or stolen?
Did you receive a suspicious phone call, email, or text?
Do you think someone may have targeted you through social media?
Were you a victim of identity theft?
What do I do if I receive an email confirming changes made to my account when I did not?
Our Part - How we protect you
Legacy Apex associates are required to participate in annual security training.
Social Security Number Protections
Safeguards are in place to protect your information.
- We prohibit the unlawful disclosure of your Social Security number.
- We restrict access to your Social Security number except when required for authorized business purposes.
Our Communication Practices
Electronic Funds Transfer (EFT)
We offer various ways to move money electronically for the purpose of paying bills, making purchases and managing your accounts. Such services include, ATM/debit cards, electronic check conversion, phone transfers, online bill payment and online banking external funds transfer. When using these services, we ask that you monitor your account and alert us of any unauthorized transactions.
Data Security Breaches
Your Part - What you can do
Use ATMs safely
Please review the tips below and be aware of your surroundings when using any ATM.
- Be prepared: Have your deposit slips, checks, endorsements, and other documents ready.
- Be cautious: Inspect the ATM for skimming devices that can be attached to ATMs and capture your card information. Protect your PIN by shielding your PIN entry with your hand or body.
- Be observant: Scan the surrounding area prior to approaching an ATM. If you feel uneasy for any reason, leave the area.
- Be patient: If you see another person using the ATM, allow them to finish their transaction before approaching.
Stay safe online
Avoid fraud on your accounts
Prevent identity theft
Spot a phishing email
Phishing is a common scam that uses email to collect personal or financial information. A phishing email often appears to be sent from a legitimate source that is actually an imposter.
How to spot a phishing email:
- Requests: If information is requested in an email, identify alternative ways to provide the information. If you have any doubt, don't respond to the email.
- Email details: Inspect the sender's email address and hover over any URL links included in the message. Although the email address and URL may appear to be legitimate at first glance, this information can be spoofed or direct you to an unauthorized site.
- Urgency: Scare tactics are often used to prompt victims to respond to requests for personal or financial information. Email notices that threaten to close your account or impose fines or penalties should be treated as suspect.
- Typos and grammatical errors: Spelling errors and oddly structured sentences can be a quick indication that the email is not from a legitimate source.
Protect yourself from malware
Take action on any breach immediately
Frequently Asked Questions
Mobile Banking Security
Beyond the practices and procedures that we have in place and recommend for all our customers, our customers with Commercial accounts should take extra precautions to ensure the safety of their data.
Protecting Online Payments and Account Data
While it's your responsibility to safeguard your own data, including information that can be used to access your accounts at Legacy Apex, we recommend that you consider implementing the following controls for your business:
- Evaluate your internal controls for online banking and conduct an annual risk assessment. Identify gaps and continuous improvement opportunities to ensure the safety of your financial data and resources.
- Dedicate and restrict one computer to online banking transactions, and allow no Internet browsing or email exchange on it. Ensure that each computer is equipped with the latest versions and patches of both anti-virus and anti-spyware software.
- Segregate responsibilities among different employees by maintenance, entry, and approval.
- Delete online user IDs as part of the exit procedure when employees leave your company.
- Assign dual system administrators for online cash management services.
- Periodically evaluate employee job functions and remove online services.
- Establish transaction limits for employees who initiate and approve online payments.
- Set up alerts to notify managers of payments initiated above a threshold amount that warrant management's attention.
- Use dual controls: Require multiple users to release an online payment since it is less likely that a fraudster would control the workstation of both initiating employees.
- Reconcile records by carefully monitoring account activity and reviewing all transactions initiated by your company on a daily basis.
- Use separate accounts for electronic and paper transactions to simplify monitoring and tracking any discrepancies.
Apple, the Apple logo, and iPhone are trademarks of Apple Inc., registered in the U.S. and other countries. Apple Pay and Touch ID are trademarks of Apple Inc.
Apple Pay is not currently available for our partner cards.
Legacy Apex Wallet is currently not available to customers of our partner cards. Legacy Apex Bank retail debit card customers can use Legacy Apex Wallet to receive real-time notifications and view account balances and transactions. Legacy Apex payment card customers can only use Legacy Apex Wallet to view account balances and transactions.
Legacy Apex does not provide, endorse, nor guarantee any third-party product, service, information or recommendation listed above. The third parties listed are not affiliated with Legacy Apex and are solely responsible for their products and services. All trademarks are the property of their respective owners.